Skip to main content
Log in

Children's cyber-safety and protection in Australia: An analysis of community stakeholder views

  • Original Article
  • Published:
Crime Prevention and Community Safety Aims and scope

Abstract

Protecting children from the risks posed by negative influences in the online environment (that is, cyber-safety) is a growing concern within the Australian community. In this study, the views of 151 individuals and community stakeholder organizations, which represent the interests of children's cyber-safety in Australia, were analysed using content coding and analysis techniques. The analysis suggests that, given the accessibility of the online environment, stakeholders may need to exercise structured controls for child safety. In examining the major cyber threats and responses identified by the stakeholders, the study found that cyber-safety education and awareness programs are considered to represent the main effective and viable threat response. In addition, the research uncovered cyber bullying as a ‘whole of community’ problem that might be addressed through robust bullying prevention policies and programs, and improved resources and training for teachers, school principals and parents. The study notes that current policy directions for children's cyber-safety will need to flow through to every layer of the community.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Agatston, P., Kowalski, R. and Limber, S. (2007) Students’ perspectives on cyber bullying. Journal of Adolescent Health 41 (6): S59–S60.

    Article  Google Scholar 

  • Amoroso, E. (1994) Fundamentals of Computer Security Technology. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Australian Bureau of Statistics. (2009) Household Use of Information Technology, Australia 2008–2009, Cat. No. 8146.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0.

  • Australian Bureau of Statistics. (2011) Internet Activity, Australia December 2010, Cat. No. 8153.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0/.

  • Australian Communications and Media Authority. (2008) Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety: Second Annual Report to the Minister for Broadband, Communications and the Digital Economy. Canberra, Australia: ACMA.

  • Australian Communication and Media Authority. (2009) Use of Electronic Media and Communications: Early Childhood to Teenage Years. Findings from Growing Up in Australia: The Longitudinal Study of Australian Children (3 to 4 and 7 to 8-year-olds), and Media and Communications in Australian Families (8 to 17-year-olds), 2007. Canberra, Australia: ACMA.

  • Australian Communication and Media Authority. (2011) CyberSmart Cyber-safety Program. Canberra, Australia: ACMA, http://www.cybersmart.gov.au/.

  • Bauer, J. and van Eeten, M. (2009) Cybersecurity: Stakeholder incentives, externalities and policy options. Telecommunications Policy 33 (10–11): 706–719.

    Article  Google Scholar 

  • Beran, T. and Li, Q. (2005) Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research 32 (3): 265–277.

    Article  Google Scholar 

  • Berson, I. and Berson, M. (2003) Digital literacy for effective citizenship: Cybersafety, digital awareness, and media literacy. Social Education 67 (3): 164–167.

    Google Scholar 

  • Berson, I., Berson, M. and Berson, J. (2002) Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence 1 (2): 51–72.

    Article  Google Scholar 

  • Bhaskar, R. (2006) State and local law enforcement is not ready for a cyber katrina. Communications of the ACM 49 (2): 81–83.

    Article  Google Scholar 

  • Bissonette, A. (2009) Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms. Thousand Oaks, CA: Corwin.

    Google Scholar 

  • Brown, K., Jackson, M. and Cassidy, W. (2006) Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy 57 (December): 8–11.

    Google Scholar 

  • Burns, R., Whitworth, K. and Thompson, C. (2004) Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice 32 (5): 477–493.

    Article  Google Scholar 

  • Bushman, B. and Huesmann, L. (2006) Short-term and long-term effects of violent media on aggression in children and adults. Archives of Pediatrics and Adolescent Medicine 160 (4): 348–352.

    Article  Google Scholar 

  • Butcher, S. (2011) Brodie's Suicide prompts Law on Bullying. The Melbourne Age, Australia, http://www.theage.com.au/small-business/brodies-suicide-prompts-law-on-bullying-20110405-1czub.html, accessed 5 April 2011.

  • Campbell, M. (2005) Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15 (1): 68–76.

    Article  Google Scholar 

  • Commonwealth of Australia. (2010) Inquiry into Cyber-Safety. Joint Select Committee on Cyber-Safety, http://www.aph.gov.au/house/committee/jscc/index.htm.

  • Commonwealth of Australia. (2011) High Wire Act: Cyber-Safety and the Young, Joint Select Committee on Cyber-Safety (June).

  • Corley, K. and Gioia, D. (2004) Identity ambiguity and change in the wake of a corporate spin-off. Administrative Science Quarterly 49 (2): 173–208.

    Google Scholar 

  • CrimTrac Agency. (2009) In focus: CETS/ANVIL project. OnTrac 2 (3): 6–9.

  • Cross, D. et al (2009) Australian Covert Bullying Prevalence Study (ACBPS). Perth, Australia: Child Health Promotion Research Centre, Edith Cowan University.

    Google Scholar 

  • Denzin, N. and Lincoln, Y. (2005) The Handbook of Qualitative Research, 3rd edn. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Donaghey, K. (2011) Cyber bullying victim Dannii sanders let down by authorities. Courier Mail, Australia, http://www.couriermail.com.au/news/queensland/cyber-bullying-victim-dannii-sanders-let-down-by-mental-health-system-say-parents/story-e6freoof-1226100469604, accessed 24 July.

  • Freeman, R., Wicks, A. and Parmar, B. (2004) Stakeholder theory and ‘the corporate objective revisited'. Organization Science 15 (3): 364–369.

    Article  Google Scholar 

  • Gentile, D. and Gentile, J. (2008) Violent video games as exemplary teachers: A conceptual analysis. Journal of Youth and Adolescence 37 (2): 127–141.

    Article  Google Scholar 

  • Goodstein, A. (2007) Totally Wired: What Teens and Tweens are Really Doing Online. New York: St Martin's Press.

    Google Scholar 

  • Hinduja, S. and Patchin, J. (2007) Offline consequences of online victimization: School violence and delinquency. Journal of School Violence 6 (3): 89–112.

    Article  Google Scholar 

  • Hinduja, S. and Patchin, J. (2008) Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior 29 (2): 129–156.

    Article  Google Scholar 

  • Hinduja, S. and Patchin, J. (2009) Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Corwin Press Sage.

    Google Scholar 

  • Jain, A. (2005) Cyber Crime Issues, Threats and Management. Delhi, India: Isha Books.

    Google Scholar 

  • Jakubiak, D. (2010) A Smart Kid's Guide to Avoiding Online Predators. New York: Rosen Publishing Group.

    Google Scholar 

  • Johnson, E. (2006) Security awareness: Switch to a better programme. Network Security 2006 (2): 15–18.

    Article  Google Scholar 

  • Johnson, S. (2004) Keep your Kids Safe on the Internet. New York: McGraw-Hill/Osborne.

    Google Scholar 

  • Juvonen, J. and Gross, E. (2008) Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health 78 (9): 496–505.

    Article  Google Scholar 

  • Keith, S. and Martin, M. (2005) Cyber-bullying: Creating a culture of respect in a cyber world. Children and Youth 13 (4): 224–228.

    Google Scholar 

  • Kids Helpline. (2011) Kids helpline services, http://www.kidshelp.com.au, accessed 5 May 2011.

  • Klomek, A., Marrocco, F., Kleinman, M., Schonfeld, I. and Gould, M. (2008) Peer victimization, depression, and suicidiality in adolescents. Suicide and Life-Threatening Behavior 38 (2): 166–180.

    Article  Google Scholar 

  • Kowalski, R. and Limber, S. (2008) Electronic bullying among middle school students. Journal of Adolescent Health 41 (6): S22–S30.

    Article  Google Scholar 

  • Kowalski, R., Limber, S. and Agatston, P. (2007) Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley/Blackwell.

    Google Scholar 

  • LaRose, R., Rifon, N. and Enbody, R. (2008) Promoting personal responsibility for Internet safety. Communications of the ACM 51 (3): 71–76.

    Article  Google Scholar 

  • Li, Q. (2007a) Bullying in the new playground: Research into cyberbullying and cyber victimization. Australasian Journal of Educational Technology 23 (4): 435–454.

    Article  Google Scholar 

  • Li, Q. (2007b) New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior 23 (4): 1777–1791.

    Article  Google Scholar 

  • Lifeline. (2011) Crisis Support, Suicide Prevention, Mental Health Support, http://www.lifeline.org.au.

  • Livingstone, S. and Helsper, E. (2007) Taking risks when communicating on the Internet: the role of offline social-psychological factors in young people's vulnerability to online risks. Information, Communication & Society 10 (5): 619–644.

    Article  Google Scholar 

  • Lodge, J. and Frydenberg, E. (2007) Cyber-bullying in Australian schools: Profiles of adolescent coping and insights for school practitioners. The Australian Educational and Developmental Psychologist 24 (1): 45–58.

    Article  Google Scholar 

  • Mansell, R. and Collins, B. (2005) Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar Publishing.

    Google Scholar 

  • McCarthy, M. (2004) Filtering the internet: The children's internet protection act. Educational Horizons 82 (2): 108–113.

    Google Scholar 

  • McQuade, S., Colt, J. and Meyer, N. (2009) Cyber Bullying: Protecting Kids and Adults from Online Bullies. Santa Barbara, CA: ABC-CLIO.

    Google Scholar 

  • Microsoft Corporation. (2005) Tool Thwarts Online Child Predators: Microsoft helped international law enforcement create the Child Exploitation Tracking System as part of a continuing collaboration to stop those who prey on children online, http://www.microsoft.com/presspass/features/2005/apr05/04-07CETS.mspx, accessed 12 May 2011.

  • Miles, M. and Huberman, A. (1997) Qualitative Data Analysis – An Expanded Case Book, 2nd edn. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Mitchell, K., Finkelhor, D. and Wolak, J. (2005) Protecting youth online: Family use of filtering and blocking software. Child Abuse and Neglect 29 (7): 753–765.

    Article  Google Scholar 

  • Myers, J., McCaw, D. and Hemphill, L. (2011) Responding to Cyber Bullying: An Action Tool for School Leaders. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Palfrey, J., Boyd, D., Sacco, D. and DeBonis, L. (2008) Enhancing Child Safety and Online Technologies. Boston, MA: Berkman Center for Internet and Society, Harvard University.

    Google Scholar 

  • Parliament of Victoria. (2011) Crimes Amendment (Bullying) Bill 2011, http://www.austlii.edu.au/au/legis/vic/bill/cab2011266/, accessed 1 June 2011.

  • Philippsohn, S. (2001) Trends in cybercrime: An overview of current financial crimes on the internet. Computers & Security 20 (1): 53–69.

    Article  Google Scholar 

  • Privitera, C. and Campbell, M. (2009) Cyberbullying: The new face of workplace bullying? CyberPsychology and Behavior 12 (4): 395–400.

    Article  Google Scholar 

  • Rogers, V. (2010) Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World. London, UK: Jessica Kingsley Publishers.

    Google Scholar 

  • Roland, E. (2002) Bullying, depressive symptoms and suicidal thoughts. Educational Research 44 (1): 55–67.

    Article  Google Scholar 

  • Shariff, S. (2009) Confronting Cyberbullying: What Schools need to know to Control Misconduct and Avoid Legal Consequences. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Smith, G. (2007) How to Protect Your Children on the Internet: A Roadmap for Parents and Teachers. Westport, CT: Greenwood Publishing Group.

    Google Scholar 

  • Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry 49 (4): 376–385.

    Article  Google Scholar 

  • Sommer, P. (2004) The future for the policing of cybercrime. Computer Fraud & Security 2004 (1): 8–12.

    Article  Google Scholar 

  • Sommers, M. (2008) The Dangers of Online Predators. New York: Rosen Publishing.

    Google Scholar 

  • Spears, B., Slee, P., Owens, L. and Johnson, B. (2008) Behind the Scenes: Insights into the Human Dimension of Covert Bullying. Adelaide, Australia: Hawke Research Institute for Sustainable Societies, University of South Australia.

    Google Scholar 

  • Sullivan, M. (2008) Online Predators. Englewood Cliffs, NJ: Xulon Press.

    Google Scholar 

  • Thomas, D. and Loader, B. (2003) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. New York: Routledge.

    Google Scholar 

  • Thomson, M. and von Solms, R. (1998) Information security awareness: Educating your users effectively. Information Management & Computer Security 6 (4): 167–173.

    Article  Google Scholar 

  • Trolley, B. and Hanel, C. (2010) Cyber Kids, Cyber Bullying, Cyber Balance. Thousand Oaks, CA: Corwin Sage.

    Google Scholar 

  • UK Office of Cyber Security. (2009) Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyberspace. London, UK: Crown.

  • UK Office of Science and Technology. (2004) Cyber Trust and Crime Prevention Project: Gaining Insight from Three Different Futures. London, UK: Crown.

  • Vandebosch, H. and Van Cleemput, K. (2008) Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11 (4): 499–503.

    Article  Google Scholar 

  • Walsh, M. (2003) Teaching qualitative analysis using QSR NVivo. The Qualitative Report 8 (2): 251–256.

    Google Scholar 

  • Wang, J., Iannotti, R. and Nansel, T. (2009) School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health 45 (4): 368–375.

    Article  Google Scholar 

  • Willard, N. (2007a) Cyber Bullying and Cyber Threats. Champaign, IL: Research Press.

    Google Scholar 

  • Willard, N. (2007b) Cyber-Safe Kids, Cyber-Savvy Teens. San Francisco, CA: John Wiley & Sons.

    Google Scholar 

  • Wilson, D. and Jones, T. (2008) In my own world: A case study of a paedophile's thinking and doing and his use of the internet. The Howard Journal of Criminal Justice 47 (2): 107–120.

    Article  Google Scholar 

  • Wolak, J., Mitchell, K. and Finkelhor, D. (2007) Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health 41 (6): 51–58.

    Article  Google Scholar 

  • Wooding, S., Anham, A. and Valeri, L. (2003) Raising Citizen Awareness of Information Security: A Practical Guide, eAware Program. Berlin, Germany: RAND Europe.

    Google Scholar 

  • Ybarra, M., Diener-West, M. and Leaf, P. (2007a) Examining the overlap in Internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health 41 (6): 42–50.

    Article  Google Scholar 

  • Ybarra, M., Espelage, D. and Mitchell, K. (2007b) The co-occurrence of internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health 41 (6) : S31–S41.

    Article  Google Scholar 

  • Ybarra, M. and Mitchell, K. (2004) Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry 45 (7): 1308–1316.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nigel Martin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Martin, N., Rice, J. Children's cyber-safety and protection in Australia: An analysis of community stakeholder views. Crime Prev Community Saf 14, 165–181 (2012). https://doi.org/10.1057/cpcs.2012.4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/cpcs.2012.4

Keywords

Navigation